Search Header Logo

NS4

Authored by Fer Ch

others

NS4
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

171 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which statement describes a characteristic of automation stitches?

They can run multiple actions simultaneously.
They can be run only on devices in the Security Fabric.
They can have one or more triggers
They can be created on any device in the fabric.

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

What are two functions of ZTNA? (Choose two.)

ZTNA manages access through the client only.
ZTNA manages access for remote users only.
ZTNA provides a security posture check.
ZTNA provides role-based access.

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

What are two benefits of flow-based inspection compared to proxy-based inspection? (Choose two.)

FortiGate uses fewer resources.
FortiGate allocates two sessions per connection.
FortiGate performs a more exhaustive inspection on traffic.
FortiGate adds less latency to traffic.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Refer to the exhibits. The exhibits show a firewall policy (Exhibit A) and an antivirus profile (Exhibit B). Why Is the user unable to receive a block replacement message when downloading an Infected file for the first time?

The volume of traffic being Inspected is too high for this model of FortIGate
Flow-based Inspection is used, which resets the last packet to the user.
The firewall policy performs a full content Inspection on the file
The intrusion prevention security profile must be enabled when using flow-based inspection mode.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which statement correctly describes the use of reliable logging on FortiGate?

Reliable logging is enabled by default in all configuration scenarios.
Reliable logging can be configured only using the CLI
Reliable logging is required to encrypt the transmission of logs
Reliable logging prevents the loss of logs when the local disk is full.

6.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Media Image

Refer to the exhibits Exhibit A shows a topology for a ForiiGate HA cluster that performs proxy-based inspection on traffic. Exhibit B shows the HA configuration and the partial output of the gee syst Based on the exhibits, which two statements about the traffic passing through the cluster are true? (Choose two.)

For non-load balanced connections, packets forwarded by the cluster to the server contain the virtual MAC address of port2 as source
For load balanced connections, the primary encapsulates TCP SYN packets before forwarding them to the secondary.
The cluster can load balance ICMP connections to the secondary.
The traffic sourced from the client and destined to the server Is sent to FGT-1.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Refer to the exhibits Based on the ZTNA tag, the security posture of the remote endpoint has changed. What will happen to endpoint active ZTNA sessions?

They will be re-evaluated to match the security policy.
They will be re-evaluated to match the endpoint policy.
They will be re-evaluated to match the ZTNA policy.
They will be re-evaluated to match the firewall policy.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?